无论如何,这项研究提供的信息将在评估手机使用的安全性中具有巨大的价值。
However, this study provides information that will be of great value in assessing the safety of cell phone use.
由于信息安全风险评估不足,导致安全事件不断发生。
Because information safety risk assessment is insufficient, lead to security incidents occur repeatedly.
本文主要研究的内容是网络信息的探测技术和建立在信息探测基础上的安全评估方法。
The main research content of this paper is network information detection technology and network security evaluation method.
本文将基于风险评估技术的主动防御策略引入电力信息网络的安全防护中。
This paper introduces the active defense policy based on risk assessment technology into safe protection of electric power information network.
传统信息系统安全风险评估从系统运行维护环境出发,分析其漏洞和威胁。
Traditional risk assessment of information system security goes from the environment of system operating and preservation, analyzing its loopholes and threats.
所以,对安全监测信息的使用是安全监测系统应用的主要瓶颈,需要研究如何利用安全监测信息对结构的安全状态进行实时和定量的评估。
Thus the evaluation of the safety of the structure, based on the monitoring information, is a bottleneck of the development of the monitoring system.
第三部分,论文着重研究了一种基于资产、威胁和弱点的信息安全风险评估量化模型。
In the third part, the paper emphasizes the study of information security risk quantification assessment model based on assets, threats and weaknesses.
网络拓扑发现是通过收集网络传输的信息来研究网络连通结构的一项技术,在网络管理和网络安全评估发面具有重要意义。
Network topology discovery is a technology that research for network structure by collecting network transmission data, which is important in network management and network security evaluation.
因此,在模型中的信息收集以后可以被用来进行攻击测试,以评估网络的安全水平。
Thus, information gathered in the model can later be used to conduct testing attacks in order to evaluate the network security level.
基于前面的关键技术,第四章详细设计了基于信息探测的网络安全评估系统的方案并给出了具体实现的方法。
According to the key techniques above, the paper designs system of network security evaluation based on information detection in chapter 3, and supplies method for the system realization.
风险评估是信息系统安全保证的关键技术。
Risk assessment as one of the core technologies ensures it system security.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
本文针对信息安全风险评估进行阐述。
This paper describes the Security Risk Assessment of information.
安全评估是对信息系统进行风险管理的一个重要步骤。
Security assessment is an important process to carry out information system risk management.
而风险评估作为信息安全管理的一个重要环节,对保障企事业的基础信息系统安全有着非常重要的作用。
As an essential part of information security Management, information Risk Assessment takes a very important role in securing the safety and security of fundamental information systems.
信息安全风险评估是信息系统安全工程的重要组成部分,也是建立信息安全保障体系的基础。
Information security risk assessment is not only the most component of the information system security engineering, but also the basis to construct the information safety guarantee system.
首先从信息安全风险评估的流程入手,着重叙述了信息安全风险评估过程中风险计算的原理和步骤。
At first, start with from procedure of information security risk assessment, describe the principle and step that risk calculate in the evaluation process especially.
算法用贝耶斯推理处理不确定信息,量化地评估系统安全状态,并且有效地消除误报。
The algorithm handles uncertain information with Bayesian inference, giving a quantitative evaluation of the security state of a system and eliminating false alarms effectively.
正在考虑创建一所新的大学校园,你们的任务是对这所大学的信息技术(IT)安全性的风险评估建立模型。
The creation of a new university campus is being considered. Your requirement is to model the risk assessment of information technology (it) security for this proposed university.
负责公司的信息系统安全:评估和控制风险、制定安全政策、制定灾难恢复计划、确保政策与计划执行。
Information security management includes security risk assessment, security policy formulation, disaster recovery planning and to ensure the effectiveness of these policies.
最后,利用安全信息关联和融合的结果进行量化的实时安全风险评估。
Finally, a real-time risk evaluation method is introduced utilizing the result of information correlation and information fusion.
已提出的信息系统安全评估的准则和标准在理论结构上还不成熟,而且可操作性不强。
Evaluation of having bought forward Information security rules is not mature in theory and not strong at maneuverability.
为了保障移动通信信息系统的安全,制定有效的、操作性的、学的安全风险评估体系是当务之急。
To safeguard the information system of mobile communication, it is urgent to make effective, maneuverable and scientific security risk evaluation system.
通过对调研所得数据进行收集、归纳、比较和分析,本文提出了基于ISO 27000的针对复合图书馆信息安全的风险评估实施模型。
According to research data collected, summarized, comparison and analysis, it present implement model of information security risk assessment of hybrid library based on the ISO27000.
针对这个问题,设计实现了基于信息技术安全性评估准则(通用标准)的系统评估方法和软件。
To the question, the paper presents a system evaluation method and software based on the evaluation Criteria for Information Technology Security (Common Criteria).
本文论述了开放系统互联安全体系结构下的重钢信息网络安全现状分析和风险评估;
The article deals with the current analysis and risk evaluation of CISC (Chongqing Iron and Steel Company)'s information internet security under the opening systematic co-action secure structure.
介绍了对一个灾难中指挥系统地震信息安全计划的 自我风险评估。
Self-risk evaluation of the seismic information safety plan of the command system during a disastrous event is also discussed.
介绍了对一个灾难中指挥系统地震信息安全计划的 自我风险评估。
Self-risk evaluation of the seismic information safety plan of the command system during a disastrous event is also discussed.
应用推荐